MATH 220 (All Sections)—Homework #12 Not to Be Turned in Posted Friday, November 24, 2017

Total Page:16

File Type:pdf, Size:1020Kb

MATH 220 (All Sections)—Homework #12 Not to Be Turned in Posted Friday, November 24, 2017 MATH 220 (all sections)—Homework #12 not to be turned in posted Friday, November 24, 2017 Definition: A set A is finite if there exists a nonnegative integer c such that there exists a bijection from A to fn 2 N: n ≤ cg. (The integer c is called the cardinality of A.) I. (a) Let A be a finite set, and let B be a subset of A. Prove that B is finite. (Hint: induction on jAj. Note that our proof can’t use induction on jBj, or indeed refer to “the number of elements in B” at all, because we don’t yet know that B is finite!) (b) Prove that the union of two disjoint finite sets is finite. (c) Prove that the union of any two finite sets is finite. (Hint: A [ B = A [ (B − A).) (a) We proceed by induction on the nonnegative integer c in the definition that A is finite (the cardinality of c). Basis step: c = 0. Then there is a bijection from A to fn 2 N: n ≤ 0g = ;, and thus A = ; (and, for that matter, the bijection is also the empty function). This forces B = ; as well (since that is the only subset of ;), which is certainly finite. Induction step: Let c ≥ 0. The induction hypothesis is: if A has cardinality c, then any subset of A is finite. Now suppose A has cardinality c + 1, and let f : A ! fn 2 −1 N: n ≤ c + 1g be a bijection. Define A1 = f (f1; : : : ; cg), and note that f restricted to A1 is a bijection from A1 to f1; : : : ; cg, so that A1 has cardinality c. Finally, let B be a subset of A. −1 −1 Case 1: f (c + 1) 2= B. Then B is a subset of f (f1; : : : ; cg) = A1, which has cardinality c; by the induction hypothesis, B is finite. −1 −1 Case 2: f (c + 1) 2 B. Then define B1 = B − f (c + 1). As before, B1 is a subset of A1 and hence finite. Let d be the cardinality of B1 and let g1 : B1 ! fn 2 N: n ≤ dg be a bijection. Now define a function g : B ! fn 2 N: n ≤ d + 1g by ( g (x); if x 2 B ; g(x) = 1 1 d + 1; if x = f −1(c + 1): It is not hard to check that g is a bijection from B to fn 2 N: n ≤ d + 1g. In particular, B is finite. (b) Let C and D be finite sets with C \ D = ;, and let f : C ! fn 2 N: n ≤ cg and g : D ! fn 2 N: n ≤ dg be bijections. Define h: C [ D ! fn 2 N: n ≤ c + dg by ( f(x); if x 2 C; h(x) = g(x) + c; if x 2 D: It is (somewhat tedious but) not hard to check that h is a bijection from C [ D to fn 2 N: n ≤ c + dg. (The fact that C \ D = ; is necessary to show that h is a well-defined function.) In particular, C [ D is finite. (c) Let A and B be finite sets. Then B − A is a subset of the finite set B and hence is itself finite by part (a). Consequently, since A and B − A are always disjoint, the set A [ B = A [ (B − A) is the union of two disjoint finite sets and is therefore finite by part (b). II. Let A and B be nonempty sets. Prove that there exists an injective function f : A ! B if and only if there exists a surjective function g : B ! A. First assume that f : A ! B is injective. Let D = f(A) be the range of A; then f is a bijection from A to D. Choose any a 2 A (possible since A is nonempty). Define g : B ! A by ( f −1(y); if y 2 D; g(y) = a; if y 2 B − D: It is not hard to show that g is a well-defined function that is surjective. Conversely, assume that g : B ! A is surjective. Define a function f : A ! B as follows: for each a 2 A, choose ba 2 B such that g(ba) = a, and define f(a) = ba. It is not hard to check that f is a well-defined function that is injective. [Interested students who just read this proof might wish to find some introductory information about something called the “Axiom of Choice”.] SECTION 13.1 Show that the two given sets have equal cardinality by describing a bijection from one to the other. Describep your bijection with a formula (not as a table). 2. R and ( 2; 1) 4. The set of even integers and the set of odd integers 8. Z and S = fx 2 R: sin x = 1g 10. f0; 1g × N and Z 14. N × N and f(n; m) 2 N × N: n ≤ mg. (Hint: draw “graphs” of both sets. The northwest–southeast diagonal slices of the first set look a lot like the horizontal slices of the second set. .) p 2. Adaptingp one of the bijections from the book, define f : R ! ( 2; 1) by f(x) = x e + 2. It’s easyp to check that f is a well-defined and bijective function (for example, f −1(y) = ln(y − 2) is its inverse function). 4. A bijection f : feven integersg ! fodd integersg is f(n) = n + 1; or f(n) = n − 1; or indeed f(n) = n + k or f(n) = n − k for any fixed odd integer k. 7π 3π π 5π 8. Note that S = fx 2 R: sin x = 1g = f:::; − 2 ; − 2 ; 2 ; 2 ;::: g. We see that one π bijection f : Z ! S is f(n) = 2πn + 2 . 10. Define a function f : f0; 1g × N ! Z by ( n; if b = 0; f(b; n) = 1 − n; if b = 1: It is not hard to show that f is a bijection; for example, its inverse function is ( (0; m); if m ≥ 1; f −1(m) = (1; 1 − m); if m ≤ 0: 14. Inspired by the given hint, define a function f : f(n; m) 2 N × N: n ≤ mg ! N × N by f(n; m) = (n; m + 1 − n). Since n ≤ m for elements of the domain, we see that m+1−n ≥ 1, and so the values really do lie in the codomain. One can check that this function is a bijection; for example, its inverse function is f −1(x; y) = (x; x+y−1). III. Suppose that two sets A and B have the same cardinality. Prove that P(A) and P(B) have the same cardinality as each other. Let f : A ! B be a bijection. Define a function g : P(A) !P(B) by g(X) = f(X) for any X 2 P(A). (Let’s interpret the notation carefully: g(X) is a function value since X is an element of the domain P(A) of g, while f(X) is an image since X is a subset of the domain A of f.) We claim that g is a bijection. First, let Y 2 P(B). Then if we set X = f −1(Y ), then g(X) = f(X) = f(f −1(Y )) = Y . (The identity f(f −1(Y )) = Y isn’t true in general, but it is true when f is surjective, as shown on the previous homework.) In particular, g is surjective. Next, let X1 and X2 be elements of P(A) and suppose that g(X1) = g(X2). Then −1 −1 f(X1) = f(X2) (as images). Taking preimages of both sets yields f (f(X1)) = f (f(X2)). −1 −1 Since f is injective, we have f (f(X1)) = X1 and f (f(X2)) = X2 as shown on the previous homework; therefore X1 = X2. In particular, h is surjective. SECTION 13.2 2. Prove that the set A = f(m; n) 2 N × N: m ≤ ng is countably infinite. We already know that N×N is countably infinite. By problem 14 in Section 13.1 (above), A has the same cardinality as N × N. Therefore A is also countably infinite. 4. Prove that the set of all irrational numbers is uncountable. Let I be the set of irrational numbers. Suppose for the sake of contradiction that I is countably infinite. We already know that Q is countably infinite. Then R = Q[I, the union of two countably infinite sets, would be countably infinite as well; but this contradicts the known fact that R is uncountable. Therefore I is not countably infinite; since I is certainly an infinite set, we conclude that I is uncountable. 6. Prove or disprove: There exists a bijective function f : Q ! R. Disproof: if there were such a bijective function, then Q and R would have the same cardinality. But we know that Q is countably infinite while R is uncountable, and therefore they do not have the same cardinality. We conclude that there is no bijection from Q to R. 8. Prove or disprove: The set Z × Q is countably infinite. Proof: we know that both Z and Q are countably infinite, and we know that the Cartesian product of two countably infinite sets is again countably infinite. Therefore Z × Q is countably infinite. 12. Describe a partition of N that divides N into @0 countably infinite subsets. We know that N × N is countably infinite, so let f : N × N ! N be a bijection. For each m 2 N, define Am = f fmg × N .
Recommended publications
  • 1 Elementary Set Theory
    1 Elementary Set Theory Notation: fg enclose a set. f1; 2; 3g = f3; 2; 2; 1; 3g because a set is not defined by order or multiplicity. f0; 2; 4;:::g = fxjx is an even natural numberg because two ways of writing a set are equivalent. ; is the empty set. x 2 A denotes x is an element of A. N = f0; 1; 2;:::g are the natural numbers. Z = f:::; −2; −1; 0; 1; 2;:::g are the integers. m Q = f n jm; n 2 Z and n 6= 0g are the rational numbers. R are the real numbers. Axiom 1.1. Axiom of Extensionality Let A; B be sets. If (8x)x 2 A iff x 2 B then A = B. Definition 1.1 (Subset). Let A; B be sets. Then A is a subset of B, written A ⊆ B iff (8x) if x 2 A then x 2 B. Theorem 1.1. If A ⊆ B and B ⊆ A then A = B. Proof. Let x be arbitrary. Because A ⊆ B if x 2 A then x 2 B Because B ⊆ A if x 2 B then x 2 A Hence, x 2 A iff x 2 B, thus A = B. Definition 1.2 (Union). Let A; B be sets. The Union A [ B of A and B is defined by x 2 A [ B if x 2 A or x 2 B. Theorem 1.2. A [ (B [ C) = (A [ B) [ C Proof. Let x be arbitrary. x 2 A [ (B [ C) iff x 2 A or x 2 B [ C iff x 2 A or (x 2 B or x 2 C) iff x 2 A or x 2 B or x 2 C iff (x 2 A or x 2 B) or x 2 C iff x 2 A [ B or x 2 C iff x 2 (A [ B) [ C Definition 1.3 (Intersection).
    [Show full text]
  • GTI Diagonalization
    GTI Diagonalization A. Ada, K. Sutner Carnegie Mellon University Fall 2017 1 Comments Cardinality Infinite Cardinality Diagonalization Personal Quirk 1 3 “Theoretical Computer Science (TCS)” sounds distracting–computers are just a small part of the story. I prefer Theory of Computation (ToC) and will refer to that a lot. ToC: computability theory complexity theory proof theory type theory/set theory physical realizability Personal Quirk 2 4 To my mind, the exact relationship between physics and computation is an absolutely fascinating open problem. It is obvious that the standard laws of physics support computation (ignoring resource bounds). There even are people (Landauer 1996) who claim . this amounts to an assertion that mathematics and com- puter science are a part of physics. I think that is total nonsense, but note that Landauer was no chump: in fact, he was an excellent physicists who determined the thermodynamical cost of computation and realized that reversible computation carries no cost. At any rate . Note the caveat: “ignoring resource bounds.” Just to be clear: it is not hard to set up computations that quickly overpower the whole (observable) physical universe. Even a simple recursion like this one will do. A(0, y) = y+ A(x+, 0) = A(x, 1) A(x+, y+) = A(x, A(x+, y)) This is the famous Ackermann function, and I don’t believe its study is part of physics. And there are much worse examples. But the really hard problem is going in the opposite direction: no one knows how to axiomatize physics in its entirety, so one cannot prove that all physical processes are computable.
    [Show full text]
  • The Matroid Theorem We First Review Our Definitions: a Subset System Is A
    CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that if X ⊆ Y and Y ∈ I, then X ∈ I. The optimization problem for a subset system (E, I) has as input a positive weight for each element of E. Its output is a set X ∈ I such that X has at least as much total weight as any other set in I. A subset system is a matroid if it satisfies the exchange property: If i and i0 are sets in I and i has fewer elements than i0, then there exists an element e ∈ i0 \ i such that i ∪ {e} ∈ I. 1 The Generic Greedy Algorithm Given any finite subset system (E, I), we find a set in I as follows: • Set X to ∅. • Sort the elements of E by weight, heaviest first. • For each element of E in this order, add it to X iff the result is in I. • Return X. Today we prove: Theorem: For any subset system (E, I), the greedy al- gorithm solves the optimization problem for (E, I) if and only if (E, I) is a matroid. 2 Theorem: For any subset system (E, I), the greedy al- gorithm solves the optimization problem for (E, I) if and only if (E, I) is a matroid. Proof: We will show first that if (E, I) is a matroid, then the greedy algorithm is correct. Assume that (E, I) satisfies the exchange property.
    [Show full text]
  • Cardinality of Accumulation Points of Infinite Sets 1 Introduction
    International Mathematical Forum, Vol. 11, 2016, no. 11, 539 - 546 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/imf.2016.6224 Cardinality of Accumulation Points of Infinite Sets A. Kalapodi CTI Diophantus, Computer Technological Institute & Press University Campus of Patras, 26504 Patras, Greece Copyright c 2016 A. Kalapodi. This article is distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract One of the fundamental theorems in real analysis is the Bolzano- Weierstrass property according to which every bounded infinite set of real numbers has an accumulation point. Since this theorem essentially asserts the completeness of the real numbers, the notion of accumulation point becomes substantial. This work provides an efficient number of examples which cover every possible case in the study of accumulation points, classifying the different sizes of the derived set A0 and of the sets A \ A0, A0 n A, for an infinite set A. Mathematics Subject Classification: 97E60, 97I30 Keywords: accumulation point; derived set; countable set; uncountable set 1 Introduction The \accumulation point" is a mathematical notion due to Cantor ([2]) and although it is fundamental in real analysis, it is also important in other areas of pure mathematics, such as the study of metric or topological spaces. Following the usual notation for a metric space (X; d), we denote by V (x0;") = fx 2 X j d(x; x0) < "g the open sphere of center x0 and radius " and by D(x0;") the set V (x0;") n fx0g.
    [Show full text]
  • The Cardinality of a Finite Set
    1 Math 300 Introduction to Mathematical Reasoning Fall 2018 Handout 12: More About Finite Sets Please read this handout after Section 9.1 in the textbook. The Cardinality of a Finite Set Our textbook defines a set A to be finite if either A is empty or A ≈ Nk for some natural number k, where Nk = {1,...,k} (see page 455). It then goes on to say that A has cardinality k if A ≈ Nk, and the empty set has cardinality 0. These are standard definitions. But there is one important point that the book left out: Before we can say that the cardinality of a finite set is a well-defined number, we have to ensure that it is not possible for the same set A to be equivalent to Nn and Nm for two different natural numbers m and n. This may seem obvious, but it turns out to be a little trickier to prove than you might expect. The purpose of this handout is to prove that fact. The crux of the proof is the following lemma about subsets of the natural numbers. Lemma 1. Suppose m and n are natural numbers. If there exists an injective function from Nm to Nn, then m ≤ n. Proof. For each natural number n, let P (n) be the following statement: For every m ∈ N, if there is an injective function from Nm to Nn, then m ≤ n. We will prove by induction on n that P (n) is true for every natural number n. We begin with the base case, n = 1.
    [Show full text]
  • Fast and Private Computation of Cardinality of Set Intersection and Union
    Fast and Private Computation of Cardinality of Set Intersection and Union Emiliano De Cristofaroy, Paolo Gastiz, and Gene Tsudikz yPARC zUC Irvine Abstract. With massive amounts of electronic information stored, trans- ferred, and shared every day, legitimate needs for sensitive information must be reconciled with natural privacy concerns. This motivates var- ious cryptographic techniques for privacy-preserving information shar- ing, such as Private Set Intersection (PSI) and Private Set Union (PSU). Such techniques involve two parties { client and server { each with a private input set. At the end, client learns the intersection (or union) of the two respective sets, while server learns nothing. However, if desired functionality is private computation of cardinality rather than contents, of set intersection, PSI and PSU protocols are not appropriate, as they yield too much information. In this paper, we design an efficient crypto- graphic protocol for Private Set Intersection Cardinality (PSI-CA) that yields only the size of set intersection, with security in the presence of both semi-honest and malicious adversaries. To the best of our knowl- edge, it is the first protocol that achieves complexities linear in the size of input sets. We then show how the same protocol can be used to pri- vately compute set union cardinality. We also design an extension that supports authorization of client input. 1 Introduction Proliferation of, and growing reliance on, electronic information trigger the increase in the amount of sensitive data stored and processed in cyberspace. Consequently, there is a strong need for efficient cryptographic techniques that allow sharing information with privacy. Among these, Private Set Intersection (PSI) [11, 24, 14, 21, 15, 22, 9, 8, 18], and Private Set Union (PSU) [24, 15, 17, 12, 32] have attracted a lot of attention from the research community.
    [Show full text]
  • 1 Measurable Sets
    Math 4351, Fall 2018 Chapter 11 in Goldberg 1 Measurable Sets Our goal is to define what is meant by a measurable set E ⊆ [a; b] ⊂ R and a measurable function f :[a; b] ! R. We defined the length of an open set and a closed set, denoted as jGj and jF j, e.g., j[a; b]j = b − a: We will use another notation for complement and the notation in the Goldberg text. Let Ec = [a; b] n E = [a; b] − E. Also, E1 n E2 = E1 − E2: Definitions: Let E ⊆ [a; b]. Outer measure of a set E: m(E) = inffjGj : for all G open and E ⊆ Gg. Inner measure of a set E: m(E) = supfjF j : for all F closed and F ⊆ Eg: 0 ≤ m(E) ≤ m(E). A set E is a measurable set if m(E) = m(E) and the measure of E is denoted as m(E). The symmetric difference of two sets E1 and E2 is defined as E1∆E2 = (E1 − E2) [ (E2 − E1): A set is called an Fσ set (F-sigma set) if it is a union of a countable number of closed sets. A set is called a Gδ set (G-delta set) if it is a countable intersection of open sets. Properties of Measurable Sets on [a; b]: 1. If E1 and E2 are subsets of [a; b] and E1 ⊆ E2, then m(E1) ≤ m(E2) and m(E1) ≤ m(E2). In addition, if E1 and E2 are measurable subsets of [a; b] and E1 ⊆ E2, then m(E1) ≤ m(E2).
    [Show full text]
  • Julia's Efficient Algorithm for Subtyping Unions and Covariant
    Julia’s Efficient Algorithm for Subtyping Unions and Covariant Tuples Benjamin Chung Northeastern University, Boston, MA, USA [email protected] Francesco Zappa Nardelli Inria of Paris, Paris, France [email protected] Jan Vitek Northeastern University, Boston, MA, USA Czech Technical University in Prague, Czech Republic [email protected] Abstract The Julia programming language supports multiple dispatch and provides a rich type annotation language to specify method applicability. When multiple methods are applicable for a given call, Julia relies on subtyping between method signatures to pick the correct method to invoke. Julia’s subtyping algorithm is surprisingly complex, and determining whether it is correct remains an open question. In this paper, we focus on one piece of this problem: the interaction between union types and covariant tuples. Previous work normalized unions inside tuples to disjunctive normal form. However, this strategy has two drawbacks: complex type signatures induce space explosion, and interference between normalization and other features of Julia’s type system. In this paper, we describe the algorithm that Julia uses to compute subtyping between tuples and unions – an algorithm that is immune to space explosion and plays well with other features of the language. We prove this algorithm correct and complete against a semantic-subtyping denotational model in Coq. 2012 ACM Subject Classification Theory of computation → Type theory Keywords and phrases Type systems, Subtyping, Union types Digital Object Identifier 10.4230/LIPIcs.ECOOP.2019.24 Category Pearl Supplement Material ECOOP 2019 Artifact Evaluation approved artifact available at https://dx.doi.org/10.4230/DARTS.5.2.8 Acknowledgements The authors thank Jiahao Chen for starting us down the path of understanding Julia, and Jeff Bezanson for coming up with Julia’s subtyping algorithm.
    [Show full text]
  • The Axiom of Choice and Its Implications
    THE AXIOM OF CHOICE AND ITS IMPLICATIONS KEVIN BARNUM Abstract. In this paper we will look at the Axiom of Choice and some of the various implications it has. These implications include a number of equivalent statements, and also some less accepted ideas. The proofs discussed will give us an idea of why the Axiom of Choice is so powerful, but also so controversial. Contents 1. Introduction 1 2. The Axiom of Choice and Its Equivalents 1 2.1. The Axiom of Choice and its Well-known Equivalents 1 2.2. Some Other Less Well-known Equivalents of the Axiom of Choice 3 3. Applications of the Axiom of Choice 5 3.1. Equivalence Between The Axiom of Choice and the Claim that Every Vector Space has a Basis 5 3.2. Some More Applications of the Axiom of Choice 6 4. Controversial Results 10 Acknowledgments 11 References 11 1. Introduction The Axiom of Choice states that for any family of nonempty disjoint sets, there exists a set that consists of exactly one element from each element of the family. It seems strange at first that such an innocuous sounding idea can be so powerful and controversial, but it certainly is both. To understand why, we will start by looking at some statements that are equivalent to the axiom of choice. Many of these equivalences are very useful, and we devote much time to one, namely, that every vector space has a basis. We go on from there to see a few more applications of the Axiom of Choice and its equivalents, and finish by looking at some of the reasons why the Axiom of Choice is so controversial.
    [Show full text]
  • 17 Axiom of Choice
    Math 361 Axiom of Choice 17 Axiom of Choice De¯nition 17.1. Let be a nonempty set of nonempty sets. Then a choice function for is a function f sucFh that f(S) S for all S . F 2 2 F Example 17.2. Let = (N)r . Then we can de¯ne a choice function f by F P f;g f(S) = the least element of S: Example 17.3. Let = (Z)r . Then we can de¯ne a choice function f by F P f;g f(S) = ²n where n = min z z S and, if n = 0, ² = min z= z z = n; z S . fj j j 2 g 6 f j j j j j 2 g Example 17.4. Let = (Q)r . Then we can de¯ne a choice function f as follows. F P f;g Let g : Q N be an injection. Then ! f(S) = q where g(q) = min g(r) r S . f j 2 g Example 17.5. Let = (R)r . Then it is impossible to explicitly de¯ne a choice function for . F P f;g F Axiom 17.6 (Axiom of Choice (AC)). For every set of nonempty sets, there exists a function f such that f(S) S for all S . F 2 2 F We say that f is a choice function for . F Theorem 17.7 (AC). If A; B are non-empty sets, then the following are equivalent: (a) A B ¹ (b) There exists a surjection g : B A. ! Proof. (a) (b) Suppose that A B.
    [Show full text]
  • Composite Subset Measures
    Composite Subset Measures Lei Chen1, Raghu Ramakrishnan1,2, Paul Barford1, Bee-Chung Chen1, Vinod Yegneswaran1 1 Computer Sciences Department, University of Wisconsin, Madison, WI, USA 2 Yahoo! Research, Santa Clara, CA, USA {chenl, pb, beechung, vinod}@cs.wisc.edu [email protected] ABSTRACT into a hierarchy, leading to a very natural notion of multidimen- Measures are numeric summaries of a collection of data records sional regions. Each region represents a data subset. Summarizing produced by applying aggregation functions. Summarizing a col- the records that belong to a region by applying an aggregate opera- lection of subsets of a large dataset, by computing a measure for tor, such as SUM, to a measure attribute (thereby computing a new each subset in the (typically, user-specified) collection is a funda- measure that is associated with the entire region) is a fundamental mental problem. The multidimensional data model, which treats operation in OLAP. records as points in a space defined by dimension attributes, offers Often, however, more sophisticated analysis can be carried out a natural space of data subsets to be considered as summarization based on the computed measures, e.g., identifying regions with candidates, and traditional SQL and OLAP constructs, such as abnormally high measures. For such analyses, it is necessary to GROUP BY and CUBE, allow us to compute measures for subsets compute the measure for a region by also considering other re- drawn from this space. However, GROUP BY only allows us to gions (which are, intuitively, “related” to the given region) and summarize a limited collection of subsets, and CUBE summarizes their measures.
    [Show full text]
  • Monomorphism - Wikipedia, the Free Encyclopedia
    Monomorphism - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Monomorphism Monomorphism From Wikipedia, the free encyclopedia In the context of abstract algebra or universal algebra, a monomorphism is an injective homomorphism. A monomorphism from X to Y is often denoted with the notation . In the more general setting of category theory, a monomorphism (also called a monic morphism or a mono) is a left-cancellative morphism, that is, an arrow f : X → Y such that, for all morphisms g1, g2 : Z → X, Monomorphisms are a categorical generalization of injective functions (also called "one-to-one functions"); in some categories the notions coincide, but monomorphisms are more general, as in the examples below. The categorical dual of a monomorphism is an epimorphism, i.e. a monomorphism in a category C is an epimorphism in the dual category Cop. Every section is a monomorphism, and every retraction is an epimorphism. Contents 1 Relation to invertibility 2 Examples 3 Properties 4 Related concepts 5 Terminology 6 See also 7 References Relation to invertibility Left invertible morphisms are necessarily monic: if l is a left inverse for f (meaning l is a morphism and ), then f is monic, as A left invertible morphism is called a split mono. However, a monomorphism need not be left-invertible. For example, in the category Group of all groups and group morphisms among them, if H is a subgroup of G then the inclusion f : H → G is always a monomorphism; but f has a left inverse in the category if and only if H has a normal complement in G.
    [Show full text]